Security Information & Event Management Quiz Answers

Hello Friends in this article i am gone to share Fortinet: NSE 2 Information Security Awareness | Security Information & Event Management Quiz Answers with you..

Course link: NSE 2 Information Security Awareness


Security Information & Event Management Quiz Answers

Question 1)
How did SIEM evolve?

  • As a threat intelligence center only
  • As an information platform only
  • From an information platform to a threat intelligence center
  • From an information platform to a fully integrated and automated center for security and network operations

Question 2)
Which three regulatory standards and acts must businesses, hospitals, and other organizations comply with? (Choose three.)

  • SPML
  • XSLT
  • GDPR
  • HIPAA
  • PCI

Question 3)
Which three problems does SIEM solve? (Choose three.)

  • The lack of security awareness by employees
  • The long delay in discovering security breaches by security teams
  • The complexity of technology and the difficulty with identifying attacks
  • The lack of implementation of authentication methods
  • More sophisticated and stealthy cyber attacks

Question 4)
Which two requirements led to the development of SIEM? (Choose two.)

  • To simulate phishing attacks
  • To perform vulnerability scanning
  • To measure and prove compliance to various legislations
  • To contend with the flood of alerts issued from IPSs and IDSs

Question 5)
What does the term SIEM stand for?

  • Security Information and Event Manager
  • Security Information and Email Management
  • Security Information and Electronic Messaging
  • Security Information and Emergency Management

Question 6)
Which three tasks must technology perform to satisfy network security compliance requirements? (Choose three.)

  • Allow public access to aggregated logs
  • Monitor, correlate, and notify events in real-time
  • Aggregate logs from many network sources
  • Prevent employees from accessing the internet
  • Store log data for a length of time that satisfies auditing requirements

Question 7)
What does SIEM do primarily?

  • Manage network events and alerts/
  • Manage network information and alerts/
  • Collect, normalize, and store log events and alerts
  • Connect all security tools together into defined workflows

Question 8)
What was the impetus for more automation and machine learning in later SIEM devices?

  • Demand to reduce MIS costs
  • Requirement to manage Big Data
  • Shortage of trained personnel
  • Need to improve MIS efficiency

Question 9)
Which two requirements were the motivation for SIEM? (Choose two.)

  • Exploiting Big Data
  • Remaining competitive
  • Complying to regulations
  • Increasing number of alerts

Question 10)
Which feature is a characteristic of later SIEMs?

  • Deciphering encrypted data flows
  • Automatic backups and integrity checking
  • Collect, normalize, and store log events and alerts
  • User and entity behavior analytics (UEBA)

Question 11)
Which compliance, if ignored by businesses, hospitals, and other organizations, can result in punitive fines?

  • Complying to regulations
  • Complying to machine learning checks
  • Complying to automatic backups and integrity checks
  • Complying to User and entity behavior analytics (UEBA)

Question 12)
What was the primary driver for purchasing SIEM?

  • Comply with regulations
  • Improve MIS efficiency
  • Collect information about customers
  • Compensate for the skills-gap labor shortage

Question 13)
What is one method that SIEM uses to analyze data?

  • Apply security controls
  • Decipher encrypted data flows
  • Decipher encrypted logs and alerts
  • Watch for known indicators of compromise (IoC)

Question 14)
Which feature provides SIEM greater visibility into the entire network?

  • Complying with regulations
  • Analyzing logs and alerts from a single-pane-of-glass
  • Sharing of logs by IoTs and BYODs
  • Deciphering encrypted logs and alerts

Question 15)
Which problem was a barrier to the general acceptance of first-generation SIEM?

  • Cost to purchase was prohibitive/
  • The point solution approach to network security/
  • Did not have the features needed by organizations
  • High-level of skill was required

Question 16)
Which three compliance regulations are legislative and industry-sponsored? (Choose three.)

  • Payment Industry Card (PIC) standard
  • Payment Card Industry (PCI) standard
  • General Data Protection Regulation (GDPR)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Health Portability Insurance and Accountability Act (HPIAA)

Question 17)
What is one method that SIEM uses to analyze data?

  • Apply security controls
  • Decipher encrypted data flows/
  • Decipher encrypted logs and alerts
  • Watch for known indicators of compromise (IoC)

Question 18)
What was the primary driver for purchasing SIEM?

  • Comply with regulations
  • Improve MIS efficiency
  • Collect information about customers
  • Compensate for the skills-gap labor shortage

Question 19)
What is one method that SIEM uses to analyze data?

  • Apply security controls
  • Decipher encrypted data flows
  • Decipher encrypted logs and alerts
  • Watch for known indicators of compromise (IoC)

 

 

Leave a Comment